Cyber Security Technician Apprenticeship Standard

Provided by

Enquire about this course

About the course

Details 
Students

This apprenticeship standard is for those providing first line cyber security support. This requires individuals to monitor and detect potential security threats and escalate as necessary, and to support secure and uninterrupted business operations of an organisation through the
implementation of cyber security mechanisms and the application of cyber security procedures and controls.

Delivery model and duration:
Skills and behaviours developed in the workplace, complemented by
college block delivery of required knowledge
Duration: Typically 18 months

Ideal for:
• Cyber Security Administrator
• Access Control Administrator
• Incident Response Technician
• Junior Security Operations Centre (SOC) Analyst
• Junior Information Security Analyst
• Junior Threat and Risk Analyst
• Junior Penetration Tester
• Junior Security Analyst

The apprenticeship will cover the following core areas:
• Threat hazards, risk and intelligence
• Security threats
• Maintaining security and control of an organisation
• Cyber security mechanisms and controls: patching software, installing software updates, implementing access control, configuring firewalls
• Security incident and event management tools (SIEM) tools and protection tools
• Information security policy and procedure Benefits to business:
• Develop the skills your business needs
• Get qualified and motivated staff
• Future proof your business

Benefits for learners:
• Develop skills that will increase your career potential
• Support from industry experienced staff working with the British Computing Society
• Become an associate member of the BCS
• Become a registered IT Technician (RITTech)
• Become an accredited affiliate of the Chartered Institute for Information Security

 Entry Requirements
Typically these will include five GCSEs, (including English, Mathematics and a STEM subject); a relevant Level 2 Apprenticeship; other relevant qualifications and experience; or an aptitude test with a focus on IT skills.

 What Next?
Completers may want to progress to Cyber Security Degree Apprenticeship

Employers
Benefits to business:
• Develop the skills your business needs
• Get qualified and motivated staff
• Future proof your business

End Point Assessment
The End Point Assessment will test the entire Standard, and be undertaken as follows:
• Scenario demonstrations with questioning by an independent assessor
• A professional discussion with an independent assessor underpinned by a portfolio of 8 discrete pieces of evidence
• A knowledge test Performance in the End Point Assessment will determine the overall apprenticeship standard grade of pass, fail or distinction

Duties developed during the apprenticeship will include:

  • Cyber security policies and standards based on an Information Security Management System (ISMS)
  • Principles of cyber security compliance and compliance monitoring techniques
  • Cryptography, certificates and use of certificate management tools
  • Processes for detecting, reporting, assessing, responding to, dealing with and learning from information security events
  • Threat sources and threat identification and network reconnaissance techniques and the impact that threats might have on an organisation
  • Types of information security events – brute force attack, malware activity, suspicious user behaviour, suspicious device behaviour, unauthorized system changes
  • Computer forensic principles – the importance of ensuring that evidence is not contaminated and maintaining the continuity of evidence without compromising it
  • Standard information security event incident, exception and management reporting requirements and how to document incident and event information as part of a chain or evidence
  • Cyber security audit requirements, procedures and plans, need to obtain and document evidence in an appropriate form for an internal or external auditor to review
  • Different learning techniques and the breadth and sources of knowledge and sources of verified information and data
  • Risk assessment, risk management and business impact analysis principles
  • How their occupation fits into the wider digital landscape and any current or future regulatory requirements
  • How to use data ethically and the implications for wider society, with respect to the use of data
  • Roles within a multidisciplinary team and the interfaces with other areas of an organisation

 

Enquire

Start date Location / delivery
No fixed date Cheltenham Gloucestershire Book now

Related article

If you missed our webinar broadcast on the 17.06: Cybersecurity’s Skills Shortage: Creating New Pathways for the Next Generation